Praneet Kumar - CAB

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

COMPUTER APPLICATION IN BUSINESS

CIA - III

BY

Praneet Kumar 20215066, 3 BCom (Honours)

SUBMITTED TO-

Dr. CHABI GUPTA

SCHOOL OF COMMERCE
2020-2021
Q1. What are the different electronic payment systems? Give
relevant examples.
Ans.
Customers make
payments using
electronic methods
in the process of
electronic
payment. Whether
you want to pay
for your favourite
meal or a local
business,
electronic payment
systems make it
simple to do so. If you want to start an internet business, you'll need to use
electronic payment software to take payments. You can either engage a software
development team or delegate the development of your payment app to remote
developers. However, before you begin establishing an e-payment system for
your company, you must first understand how it works.
Different types of electronic payment system :
1. Credit Card :
Credit card payment is one of the most frequent forms of electronic payment. A
credit card is a little plastic card that is linked to an account by a unique
number. It also contains a magnetic strip that is used to read credit cards using
card readers. When a customer purchases a product using a credit card, the
credit card issuer bank pays on the customer's behalf, and the customer has a
specific amount of time to pay the credit card bill.
2. Debit Card :
Debit card is a little plastic card with a unique number that corresponds to the
bank account number, similar to a credit card. Before receiving a debit card
from the bank, you must have a bank account. The main difference between a
debit card and a credit card is that when you pay with a debit card, the money is
immediately deducted from your bank account, and you must have enough
money in your bank account to complete the transaction; however, there is no
such requirement with a credit card transaction. Customers can avoid carrying
cash and checks by using debit cards. Debit cards are widely accepted by
merchants. Having a limit on the amount that can be withdrawn in a single
transaction.
3. Smart Card :
In appearance, a smart card is similar to a credit card or a debit card, but it
contains a small microprocessor chip. It has the capability of storing a
customer's professional and/or personal data. Money is also stored on smart
cards, and the amount is deducted after each transaction. Smart cards can only
be accessed with a PIN that is provided to each customer. Smart cards are safe
since they store information in an encrypted manner and they are less expensive
and process information faster. Smart cards include the Mondex and Visa Cash
cards.
4. E-Money :
E-Money transactions are those in which a payment is made via the internet and
the funds are moved from one financial institution to another without the use of
an intermediary. E-money transactions are quicker, more convenient, and time-
saving. E-money transactions are online payments made with credit cards, debit
cards, or smart cards. E-cash is another common example. Both the customer
and the merchant must register with the bank or organisation that issuing the e-
cash.
5. Electronic Fund Transfer :
It is a common electronic payment technique for transferring funds from one
bank account to another. Accounts might be held at the same or different
financial institutions. A computer or an ATM (Automated Teller Machine) can
be used to transfer funds. EFT via the internet is becoming increasingly popular
these days. In this scenario, a consumer visits the bank's website, logs in, and
creates a new bank account. He or she then requests that a specified sum be
transferred to that account. If the customer's accounts are in the same bank, the
amount is transferred to the other account; otherwise, the transfer request is
forwarded to an ACH (Automated Clearing House) and the amount is debited
from the customer's account. The bank notifies the consumer of the fund
transfer once the funds have been transferred to another account.
Q2. Explain Behavioral Targeting and Native Advertising with
relevant examples .
Ans.
Behavioral targeting
(also known as online
behavioural
advertising) is a
marketing approach
that allows
advertisers to gather
and use data about
users' web behaviour
in order to design and
display adverts that
are most relevant to each individual. To put it another way, we can describe
behavioural targeting as the ability to offer an advertising message to the most
interested consumers based on particular facts. The history of web pages visited,
the history of web searches, time spent on a particular website, last time of visit,
abandonment of a These elements are frequently merged into single
informational user profiles, which aid advertisers in gaining a better
understanding of their target demographic. Such customer profiles aid in
determining: what targeted audiences seek and avoid, their individual interests
and preferences, the types of messaging that they find most appealing and
attractive, and so on. shopping cart, adverts and buttons clicked, and other
specific behaviours are examples of these data sets.
Types of Behavioral Targeting :
 Onsite Behavioral Targeting : Onsite behavioural targeting occurs within
a single website and is generally used in conjunction with website
customisation. Ads are shown to users depending on their activity and/or
other information about them acquired on the same site's pages. This
technique aids in the creation of a more simplified and relevant
experience for users.
 Network Behavioral Targeting : The audience is given inferred choices in
behavioural advertising. The audience is then segmented based on criteria
such as purchase intent, interests, and other web behaviour indicators.
The information is usually collected exclusively on the advertiser's
website and used for retargeting and customisation.
Behavioral Targeting Work as :

 Data
Collection

Segmentation
 Targeting
Examples :
Neutrogena :
Customers'
previous shopping
cart behaviour was
exploited by
Neutrogena, a
well-known beauty
company, to boost sales. Neutrogena decided to take measures to boost the
number of goods purchased by existing consumers after learning that 75% of its
customers were purchasing products from one part of its portfolio.
The company created product pairings using historical shopping cart data —
imagine mascara and eye make-up remover — that went well together and also
reflected prior client purchase trends.
Neutrogena designed banner ads and films presenting product pairings, product
information, and – last but not least – coupons to drive sales based on customer
buying behaviours.
Finally, buyers were shown these product pairing advertisements based on their
previous purchasing habits.
The outcomes are self-evident. Neutrogena's return on advertising spend
(ROAS) was £5.84, above its own benchmark by 289 percent.

Native Advertising :
Native advertising is paid media that is tailored to a media source's content. Paid
video content on the Youtube app is an example of mobile native advertising.
This media is created to look and operate like natural content, and it will appear
in your recommended video feed. Native advertising allows users to interact
with brands in the format of their choice. Native advertising is also less invasive
than other ad types, such as banner ads. Furthermore, because of the ad's
contextual relevance, native advertising can generate a high Click-Through Rate
(CTR) and increase conversions. Take a look at our guide on picking the best
format for your campaigns to learn more about the benefits and drawbacks.

What are Native Ads and How Do They Work?

Native advertisements, a performance marketing approach, work on the basis of


supply and demand. Publishers with a large audience and reach who want to
monetise their website are on the supply side. Advertisers on the demand side
are aiming to reach out to a specific demographic and achieve certain objectives
such as brand exposure, sales, or lead creation.

Native Advertising Example:


1. Spotify & Stranger Things

Netflix and Spotify are two companies that are well-known for using user data
to create personalised, relevant experiences. The platforms collaborated in 2017
to create a genuinely unique native advertising campaign that received a lot of
attention.
Following the release of Netflix's Stranger Things series, Spotify users
discovered that they could enter "Stranger Things" mode on the platform, where
they were assigned a Spotify playlist based on a character from the show based
on their listening habits.
This material was clearly labelled as sponsored, and the design was tailored to
Spotify's platform and aesthetic. This is an excellent example of high-level
native advertisement.

Q3. Describe the security threats  : Malicious Code, Phishing and Identity
Theft, Hacking and Cyber Vandalism, Spoofing and Spamming, Sniffing,
Insider Attacks.
Ans.

Malicious Code
Malicious code refers to any code in any component of a software system or
script that is designed to create unwanted consequences, security breaches, or
system harm. Malicious code is a type of application security threat that is
difficult to combat with traditional antivirus tools alone. Harmful code
encompasses attack scripts, viruses, worms, Trojan horses, backdoors, and
malicious active content, among other security terminology.
Time bombs, hard-coded cryptographic constants and credentials, purposeful
information and data leaks, rootkits, and anti-debugging techniques are all
examples of malicious code. These targeted malicious code threats are hidden in
software and mask their presence to evade detection by traditional security
technologies.
Insider Attacks
An insider threat/attacks is a harmful danger to an organisation that arises from
insiders, such as employees, former employees, contractors, or business allies,
who have inside information about the organization's security processes, data,
and computer systems. Fraud, theft of confidential or commercially valuable
information, theft of intellectual property, or sabotage of computer systems are
all possible threats.
There are three types of insider threats/attacks:
 Malicious insiders, who use their position of power to undermine an
organisation;
 Negligent insiders, which are people who make errors and disregard
policies, which place their organizations at risk; and
 Infiltrators, who are external actors that obtain legitimate access
credentials without authorization.

Spoofing

Spoofing is the act of misrepresenting an unknown source's message as coming


from a known, trusted source. Spoofing can be as simple as a computer
impersonating an IP address, Address Resolution Protocol (ARP), or Domain
Name System (DNS) server, or as complex as a computer spoofing an IP
address, ARP, or DNS server. Spoofing can be used to acquire access to a
target's personal information, to spread malware via infected links or
attachments, to circumvent network access rules, or to redistribute traffic in
order to launch a denial-of-service attack. Spoofing is a common approach for a
bad actor to get access to a system in order to carry out a wider cyber attack like
an advanced persistent threat or a man-in-the-middle attack.
Spoofing attacks come in many forms, primarily:
 Email spoofing
 Website and/or URL spoofing
 Caller ID spoofing
 Text message spoofing
 GPS spoofing
 Man-in-the-middle attacks
 Extension spoofing
 IP spoofing
 Facial spoofing

Spamming

Spamming is the practise of sending many unsolicited messages to a large


number of people for the purpose of commercial advertising, non-commercial
proselytising, or any other unlawful purpose, or just sending the same message
to the same user over and over again.

Sniffing

Sniffing is the technique of continuously monitoring and recording all data


packets that flow through a network. Network/system administrators employ
sniffers to monitor and troubleshoot network traffic. Sniffers are used by
attackers to capture data packets containing sensitive data such as passwords
and account information. Sniffers can be installed as hardware or software in
the system. A hostile intruder can gather and analyse all network traffic by
using a packet sniffer in promiscuous mode on a network.
There are two types of Sniffing :

1. Active Sniffing :

Active sniffing is sniffing in the switch. A switch is a network device that


connects two points. The switch controls the flow of data between its ports by
continuously checking the MAC address on each port, ensuring that data is only
sent to the correct destination. To collect communication between targets,
sniffers must actively inject traffic into the LAN to enable traffic sniffing. This
can be accomplished in a variety of ways.

2. Passive Sniffing :

This is how you scent your way through the hub. All machines on the segment
can observe any traffic that passes across the non-switched or unbridged
network segment. Sniffers work at the network's data connection layer. Any
data sent over the LAN is sent to each and every machine connected to the
network. The term "passive" refers to sniffers that are placed by attackers and
passively wait for data to be delivered before capturing it.

Phishing

Phishing is a type of identity theft that focuses on people unintentionally


providing personal information or facts that can be used for malicious reasons.
It is frequently carried out by creating a phoney website, email, or text that
appears to be from a reputable company.

Phishing attacks usually use social networking strategies along with email or
other forms of electronic contact. Direct messages exchanged over social media
and SMS text messages are two examples of techniques.
Phishers can obtain background information on the victim's personal and work
history, interests, and activities by using public sources of information.
Typically, via social media sites such as LinkedIn, Facebook, and Twitter.
These sources are typically used to gather information about potential victims,
such as their names, job titles, and email addresses. This data can then be used
to create a convincing email.

A victim is usually sent a communication that appears to have been sent by a


known contact or organisation. The attack is then carried out either by sending a
malicious file attachment or by clicking on links that lead to malicious websites.
In either case, the goal is to infect the user's device with malware or redirect the
victim to a bogus website. Fake websites are set up to deceive people into
giving over personal and financial information including passwords, account
IDs, and credit card numbers.

Identity Theft
When someone steals your personal information, such as your Social Security
number, bank account number, or credit card number, it is known as identity
theft. Identity theft can be done in a variety of ways. Some identity thieves
rummage through garbage cans in search of bank accounts and credit card
statements. Accessing company databases to obtain lists of client information is
a more high-tech way. Identity thieves can destroy a person's credit rating and
the status of other personal information once they obtain the information they
need.
Types of Identity Theft :
1. Financial Identity Theft
2. Social Security Identity Theft
3. Medical Identity Theft
4. Synthetic Identity Theft
5. Child Identity Theft
6. Tax Identity Theft
7. Criminal Identity Theft

Hacking
Hacking is the act of detecting and exploiting security flaws in a computer
system or network in order to obtain access to personal or company data. Using
a password cracking technique to obtain access to a computer system is one
example of computer hacking.
Hacking is usually a technological endeavour (like creating malvertising that
deposits malware in a drive-by attack requiring no user interaction). However,
hackers can utilise psychology to persuade a user to open a harmful attachment
or provide sensitive information. "Social engineering" is the term for these
techniques.

Cyber Vandalism

Cyber Vandalism is the act of causing harm or ruin to a computer system. Cyber
vandals may deface a website, produce malware that damages electronic files or
elements that disrupt its regular operation, or remove a disc drive to disable a
computer system instead of keying someone's automobile.
Digital vandalism, unlike digital espionage, which aims to steal and misuse
data, merely aims to damage, destroy, or disable data, machines, or networks.
Cyber Vandalism is the act of causing harm or ruin to a computer system. Cyber
vandals may deface a website, produce malware that damages electronic files or
elements that disrupt its regular operation, or remove a disc drive to disable a
computer system instead of keying someone's automobile.
Brand-jacking, or utilising a company's identity to mimic them online, is a kind
of cyber vandalism. When cyber criminals developed a website that looked
exactly like Kellogg's and then used it to make improper films employing the
brand's mascot, Tony the Tiger, Kellogg's suffered from brand-jacking.

You might also like